[go: up one dir, main page]

BRPI1008831A2 - método, elemento de rede e estação móvel para negociação de algoritimos de criptografia - Google Patents

método, elemento de rede e estação móvel para negociação de algoritimos de criptografia

Info

Publication number
BRPI1008831A2
BRPI1008831A2 BRPI1008831A BRPI1008831A BRPI1008831A2 BR PI1008831 A2 BRPI1008831 A2 BR PI1008831A2 BR PI1008831 A BRPI1008831 A BR PI1008831A BR PI1008831 A BRPI1008831 A BR PI1008831A BR PI1008831 A2 BRPI1008831 A2 BR PI1008831A2
Authority
BR
Brazil
Prior art keywords
encryption algorithm
network element
encryption
mobile station
plug
Prior art date
Application number
BRPI1008831A
Other languages
English (en)
Inventor
Zhang Aiqin
Chen Jing
Qin Jun
Deng Yongfeng
Original Assignee
Huawei Tech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=43301998&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=BRPI1008831(A2) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Huawei Tech Co Ltd filed Critical Huawei Tech Co Ltd
Publication of BRPI1008831A2 publication Critical patent/BRPI1008831A2/pt
Publication of BRPI1008831B1 publication Critical patent/BRPI1008831B1/pt

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

método, elemento de rede e estação móvel para negociação de algoritmos de criptografia. um método, elemento de rede e estação móvel (ms) para negociação de algoritmos de criptografia são mostrados. o método inclui: a obtenção de uma informação que um cartão "plug-in" da ms não suporta um primeiro algoritmo de criptografia; o apagamento do primeiro algoritmo de criptografia de uma lista de algoritmo de criptografia permitida por um elemento de rede de núcleo de acordo com a informação que o cartão "plug-in" da ms não suporta o primeiro algoritmo de criptografia; o envio da lista de algoritmo de criptografia excluindo o primeiro algoritmo de criptografia para um elemento de rede de acesso, de modo que o elemento de rede de acesso selecione um algoritmo de criptografia de acordo com a lista de algoritmo de criptografia excluindo o primeiro algoritmo de criptografia e a informação de capacidade de ms enviada a partir do ms, e envie o algoritmo de criptografia selecionado para a ms. pelo uso do método, do elemento de rede e da ms, erros devido ao fato de o cartão "plug-in" da ms não suportar um algoritmo de criptografia pode ser evitados, durante o processo de criptografia.
BRPI1008831-8A 2009-09-08 2010-09-08 Método para negociação de algoritimos de criptografia e elemento de rede núcleo BRPI1008831B1 (pt)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN200910090699.4 2009-09-08
CN2009100906994A CN102014381B (zh) 2009-09-08 2009-09-08 加密算法协商方法、网元及移动台
PCT/CN2010/076715 WO2011029388A1 (zh) 2009-09-08 2010-09-08 加密算法协商方法、网元及移动台

Publications (2)

Publication Number Publication Date
BRPI1008831A2 true BRPI1008831A2 (pt) 2021-07-06
BRPI1008831B1 BRPI1008831B1 (pt) 2022-01-18

Family

ID=43301998

Family Applications (1)

Application Number Title Priority Date Filing Date
BRPI1008831-8A BRPI1008831B1 (pt) 2009-09-08 2010-09-08 Método para negociação de algoritimos de criptografia e elemento de rede núcleo

Country Status (6)

Country Link
US (2) US8908863B2 (pt)
EP (1) EP2293515B1 (pt)
CN (1) CN102014381B (pt)
BR (1) BRPI1008831B1 (pt)
RU (1) RU2488976C2 (pt)
WO (1) WO2011029388A1 (pt)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011106484B4 (de) * 2011-06-14 2013-05-08 T-Mobile Austria Gmbh Verfahren zum Aufbau einer verschlüsselten Verbindung, Netzvermittlungseinheit und Telekommunikationssystem
KR101873330B1 (ko) * 2011-10-04 2018-07-03 삼성전자 주식회사 암호화 제어 방법 및 이를 지원하는 네트워크 시스템과 단말기 및 단말기 운용 방법
CN103973651B (zh) * 2013-02-01 2018-02-27 腾讯科技(深圳)有限公司 基于加盐密码库的账户密码标识设置、查询方法及装置
US9935977B1 (en) * 2013-12-09 2018-04-03 Amazon Technologies, Inc. Content delivery employing multiple security levels
CN103925942B (zh) * 2014-03-18 2016-06-22 烽火通信科技股份有限公司 电子设备的防尘网检测装置及方法
CN106537960A (zh) * 2014-05-20 2017-03-22 诺基亚技术有限公司 用于密码算法协商的方法、网络元素、移动终端、系统和计算机程序产品
US9961059B2 (en) * 2014-07-10 2018-05-01 Red Hat Israel, Ltd. Authenticator plugin interface
CN105828326B (zh) * 2014-07-24 2021-01-01 中兴通讯股份有限公司 一种无线局域网的接入方法、无线访问节点
WO2016102077A1 (en) 2014-12-22 2016-06-30 Telefonaktiebolaget L M Ericsson (Publ) Mitigating drawbacks of ciphering failures in a wireless network
CN106658485A (zh) * 2015-07-13 2017-05-10 中国移动通信集团重庆有限公司 一种差异化加密方法、终端及系统
CN115278658A (zh) * 2017-01-30 2022-11-01 瑞典爱立信有限公司 针对用户平面数据的完整性保护的方法
WO2018167307A1 (en) 2017-03-17 2018-09-20 Telefonaktiebolaget Lm Ericsson (Publ) Security solution for switching on and off security for up data between ue and ran in 5g
CN109803350B (zh) 2017-11-17 2021-06-08 华为技术有限公司 一种安全通信方法和装置
CN110121168B (zh) 2018-02-06 2021-09-21 华为技术有限公司 安全协商方法及装置
CN110234104B (zh) * 2018-03-06 2022-04-01 中国移动通信有限公司研究院 被叫鉴权是否验证的确定方法及装置、终端及存储介质
US12532165B2 (en) 2019-06-17 2026-01-20 Telefonaktiebolaget Lm Ericsson (Publ) Key distribution for hop by hop security in IAB networks
US11405215B2 (en) * 2020-02-26 2022-08-02 International Business Machines Corporation Generation of a secure key exchange authentication response in a computing environment
US11546137B2 (en) 2020-02-26 2023-01-03 International Business Machines Corporation Generation of a request to initiate a secure data transfer in a computing environment
US11184160B2 (en) 2020-02-26 2021-11-23 International Business Machines Corporation Channel key loading in a computing environment
US11489821B2 (en) 2020-02-26 2022-11-01 International Business Machines Corporation Processing a request to initiate a secure data transfer in a computing environment
US11310036B2 (en) 2020-02-26 2022-04-19 International Business Machines Corporation Generation of a secure key exchange authentication request in a computing environment
US11502834B2 (en) 2020-02-26 2022-11-15 International Business Machines Corporation Refreshing keys in a computing environment that provides secure data transfer
US11652616B2 (en) 2020-02-26 2023-05-16 International Business Machines Corporation Initializing a local key manager for providing secure data transfer in a computing environment
CN115915132A (zh) 2020-04-30 2023-04-04 华为技术有限公司 密钥管理方法、设备及系统
CN114079915B (zh) 2020-08-06 2024-11-22 华为技术有限公司 确定用户面安全算法的方法、系统及装置

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI111433B (fi) 1998-01-29 2003-07-15 Nokia Corp Menetelmä tiedonsiirron salaamiseksi ja solukkoradiojärjestelmä
US6705529B1 (en) * 1998-11-26 2004-03-16 Nokia Mobile Phones, Ltd. Data card holder and reader therefor
CA2387608C (en) * 1999-11-03 2005-10-18 Nokia Corporation Method and apparatus for selecting an identification confirmation information
FR2809897B1 (fr) 2000-05-31 2005-04-29 Gemplus Card Int Procede de communication securisee entre un reseau et une carte a puce d'un terminal
CN1184833C (zh) 2001-12-21 2005-01-12 华为技术有限公司 一种基于移动国家码确定保密通信中加密算法的方法
CN1219407C (zh) * 2002-07-26 2005-09-14 华为技术有限公司 一种自主选择保密通信中无线链路加密算法的方法
JP4596728B2 (ja) * 2002-08-13 2010-12-15 ルネサスエレクトロニクス株式会社 外部モジュール及び移動体通信端末
CN1479480A (zh) 2002-08-26 2004-03-03 华为技术有限公司 一种协商加密算法的方法
ATE514294T2 (de) * 2003-09-26 2011-07-15 Ericsson Telefon Ab L M Verbesserter sicherheitsentwurf für die kryptographie in mobilkommunikationssystemen
CN1332569C (zh) * 2004-04-23 2007-08-15 中兴通讯股份有限公司 协商选择空中接口加密算法的方法
CN100561917C (zh) * 2004-06-04 2009-11-18 中兴通讯股份有限公司 一种无线通信系统中选择加密算法的方法
DE602005013776D1 (de) 2004-06-17 2009-05-20 Ericsson Telefon Ab L M Sicherheit in mobilen Kommunikationssystemen
JP2006191509A (ja) * 2005-01-07 2006-07-20 N-Crypt Inc 通信システム、通信方法
US7198199B2 (en) * 2005-02-04 2007-04-03 Chun-Hsin Ho Dual universal integrated circuit card (UICC) system for a portable device
CN100433915C (zh) 2005-08-19 2008-11-12 华为技术有限公司 一种提高3g网络系统到2g网络系统切换成功率的方法
CN1937487A (zh) 2005-09-22 2007-03-28 北京三星通信技术研究有限公司 Lte中鉴权和加密的方法
EP1895706B1 (en) 2006-08-31 2018-10-31 Apple Inc. Method for securing an interaction between a first node and a second node, first node arranged for interacting with a second node and computer program
WO2009020789A2 (en) 2007-08-03 2009-02-12 Interdigital Patent Holdings, Inc. Security procedure and apparatus for handover in a 3gpp long term evolution system
CN101222322B (zh) 2008-01-24 2010-06-16 中兴通讯股份有限公司 一种超级移动宽带系统中安全能力协商的方法

Also Published As

Publication number Publication date
RU2011129116A (ru) 2013-01-20
US8908863B2 (en) 2014-12-09
EP2293515B1 (en) 2013-08-21
BRPI1008831B1 (pt) 2022-01-18
US9729523B2 (en) 2017-08-08
CN102014381B (zh) 2012-12-12
RU2488976C2 (ru) 2013-07-27
CN102014381A (zh) 2011-04-13
EP2293515A1 (en) 2011-03-09
WO2011029388A1 (zh) 2011-03-17
US20120170746A1 (en) 2012-07-05
US20150104020A1 (en) 2015-04-16

Similar Documents

Publication Publication Date Title
BRPI1008831A2 (pt) método, elemento de rede e estação móvel para negociação de algoritimos de criptografia
BR112015013079A2 (pt) método e sistema para autenticação de usuário utilizando um dispositivo móvel e por meio de certificados
BR112013007542A2 (pt) métodos e aparelho para descobrir capacidades de rede disponível via redes sem fio.
BR112022011292A2 (pt) Técnicas para usar informações de sensor para comunicações sem fio
BR112018003168A2 (pt) métodos e aparelho para estabelecimento de chave de comunicação direta
BR112012033223A2 (pt) mudança de modos de taxa de correspondência na presença de informação de estado do canal de transmissão de sinal de referência
WO2009012047A3 (en) Token-based dynamic authorization management of rfid systems
AR064549A1 (es) Metodo y aparato para autoconfiguracion de estacion de base
BRPI0911537A2 (pt) seleção de estação base servidora utilizando informação de qualidade de backhal
WO2010111610A3 (en) Generating group based information displays via template information
BR112017008598A2 (pt) controle de acesso à mídia de modo misto (mac) em um meio de comunicação compartilhado
AR065048A1 (es) Metodo y aparato para asegurar la locacion de informacion y control de acceso utilizando la informacion de locacion
BR112012033255A2 (pt) método e aparelho para garantir uma conexão em uma rede de comunicação
BR112017014984A2 (pt) técnicas para gerenciar um cliente da rede remoto a partir de um aplicativo em um dispositivo móvel
BRPI0707508A8 (pt) equipamento e método para acesso rápido em um sistema de comunicação sem fio
NO20075548L (no) Anordning og fremgangsmate for a utfore interteknologioverlevering ved bruk av overleveringsprosedyrer i henhold til standarden IEEE 802 16
BRPI0510557A (pt) método e aparelho para fornecer mensagens aperfeiçoadas em canal de controle comum em sistema de comunicação sem fio
BR112013003622A2 (pt) nó de posicionamento, equipamento de usuário e métodos dos mesmos
BR112012006655A2 (pt) método para processar prioridade de retenção e alocação em uma rede de telecomunicações, e, nó de infra-estrutura em uma rede de telecomunicações
BR112012017885A2 (pt) método, aparelho, e, meio legível por computador
BR112015000182A2 (pt) método e aparelho para vincular chave eletrônica a uma conta, página da web, servidor e terminal móvel
MX2009012807A (es) Metodo, sistema y dispositivo para la actualizacion de ubicacion en redes.
BRPI0921801A2 (pt) Estação móvel e método de comunicação móvel
BR112015019292A2 (pt) estados de chamada de sincronização de componente de rede e dispositivo móvel em transferência de sessão
WO2011025206A3 (en) Method of updating bs system information of a relay station in a broadband wireless access system

Legal Events

Date Code Title Description
B06F Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]
B06U Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]
B15K Others concerning applications: alteration of classification

Free format text: AS CLASSIFICACOES ANTERIORES ERAM: H04W 12/08 , H04L 9/14

Ipc: H04L 9/12 (2006.01), H04L 29/06 (2006.01), H04W 12

B09A Decision: intention to grant [chapter 9.1 patent gazette]
B16A Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]

Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 08/09/2010, OBSERVADAS AS CONDICOES LEGAIS. PATENTE CONCEDIDA CONFORME ADI 5.529/DF, QUE DETERMINA A ALTERACAO DO PRAZO DE CONCESSAO.